Saturday, September 22, 2018

What Is 127.0.0.1 (Local Host)??- In Hindi

Computer Localhost Kya Hai(क्या है)?

Computer Localhost वर्ड को आप सभी ने बहुत से लोगो से सुना होगा. But क्या आपको पता है की Computer Localhost Kya Hai(क्या है)? or 127.0.0.1 kya hai (क्या है)? और किस लिए Use होता है. अगर नहीं पता है तो आप बिलकुल सही जगह है, क्योकि अगर आप Website Development या Computer हैकिंग का practice करना चाहते है. तो इसके लिए Computer Localhost के बारे में जानकारी रखना बहुत जरुरी है. क्योकि ये दोनों Practice करने के लिए एक Server की जरुरत होती है और Localhost से ही सबसे सस्ता और सबसे Safe Server बना सकते है.

  • Computer Localhost Kya Hai(क्या है)? या 127.0.0.1 kya hota hai(क्या होता है)?

    Localhost यानि 127.0.0.1 Microsoft Computers का Local Server या local Network होता है. जिसके Help से Windows Computer को एक Local Web Server बनाया जा सकता है और सभी HTTP Web Application को Offline run/test किया जा सकता है. इसे Internet Information Services (IIS) के नाम भी जाना जाता है. अगर आप Website Development करते है और आप अपने Website को HTTP Web पर test करना चाहते है तो आप IIS Feature को Enable करके अपने Computer को एक Web Server बना सकते है और कंप्यूटर पर ही वेबसाइट को टेस्ट कर सकते है.

    अक्सर आप सभी ने Ethical Hacker या black Hat Hacker से ये सुना होगा की Localhost जैसा और कोई जगह नहीं है. Hacking Practice करने के लिए और सीखने के लिए, तो ऐसा इसलिए है क्योकि Localhost पर किसी भी तरह के हैकिंग practice करना legal है और आप अपने Computer पर कुछ भी कर सकते है 

    आप सभी को शायद पता ना हो, Internet Network पर जितने भी Website, Web Applications, Servers मौजूद है इन सभी के पास दो तरह के Address होते है. 

    Physical Address: Localhost, Google.com, Facebook.com, blogspot.com ये सभी Physical Address है और इन्हें हम नाम से याद कर सकते है.

    Logical Address: हर एक Web Application, Servers का जो Original Address होता है वह IP (Internet Protocol) के रूप में होता है. जैसे की Localhost का 127.0.0.1, इसे ARP (Address Resolution Protocol) की मदद से Physical Address में कन्वर्ट किया जाता है ताकि लोगो को नाम याद रखने में आसानी हो.

    • दोस्तों, यहाँ पर बताया गया है की  Computer Localhost Kya Hai(क्या है)? या 127.0.0.1 kya hai (क्या है)? अगर आप Server Side Website (PHP, JSP, ASP) बनाना चाहते है तो आपको ये पता होना चाहिए की localhost kya hai (क्या है) क्योकि कोई भी Dynamic Website बिना Server के run नहीं होता है और Localhost सबसे सस्ता और सबसे अच्छा Server है. दोस्तों अगर आपको ये Computer और Networking इनफार्मेशन पसंद आया हो तो आप इसे Share जरुर करे 

     

Tuesday, September 18, 2018

Types of Hackers

7 Types of Hackers You Should Know

 

  • Script KiddieScript Kiddies normally don’t care about hacking (if they did, they’d be Green Hats. See below.). They copy code and use it for a virus or an SQLi or something else. Script Kiddies will never hack for themselves; they’ll just download overused software (LOIC or Metasploit, for example) and watch a YouTube video on how to use it. A common Script Kiddie attack is DoSing or DDoSing (Denial of Service and Distributed Denial of Service), in which they flood an IP with so much information it collapses under the strain. This attack is frequently used by the “hacker” group Anonymous, which doesn’t help anyone’s reputation.

  • White HatAlso known as ethical hackers, White Hat hackers are the good guys of the hacker world. They’ll help you remove a virus or PenTest a company. Most White Hat hackers hold a college degree in IT security or computer science and must be certified to pursue a career in hacking. The most popular certification is the CEH (Certified Ethical Hacker) from the EC-Council.

  • Black HatAlso known as crackers, these are the men and women you hear about in the news. They find banks or other companies with weak security and steal money or credit card information. The surprising truth about their methods of attack is that they often use common hacking practices they learned early on. 

  • Gray Hat – Nothing is ever just black or white; the same is true in the world of hacking. Gray Hat hackers don’t steal money or information (although, sometimes they deface a website or two), yet they don’t help people for good (but, they could if they wanted to). These hackers comprise most of the hacking world, even though Black Hat hackers garner most (if not all) of the media’s attention.  

  • Green Hat – These are the hacker “n00bz,” but unlike Script Kiddies, they care about hacking and strive to become full-blown hackers. They’re often flamed by the hacker community for asking many basic questions. When their questions are answered, they’ll listen with the intent and curiosity of a child listening to family stories. 

  • Red Hat – These are the vigilantes of the hacker world. They’re like White Hats in that they halt Black Hats, but these folks are downright SCARY to those who have ever tried so much as PenTest. Instead of reporting the malicious hacker, they shut him/her down by uploading viruses, DoSing and accessing his/her computer to destroy it from the inside out. They leverage multiple aggressive methods that might force a cracker to need a new computer.

  • Blue Hat – If a Script Kiddie took revenge, he/she might become a Blue Hat. Blue Hat hackers will seek vengeance on those who’ve them angry. Most Blue Hats are n00bz, but like the Script Kiddies, they have no desire to learn.

There you have it. Thanks for reading.  

Monday, September 10, 2018

What is Two Step Verification in Whatsapp???

WhatsApp two step verification:

WhatsApp has started rolling out the two step
verification security feature for its users on Android, iOS and Windows. As a part of the new feature, users will be able to verify their number on the app on a new device more securely by using a six-digit passcode.
But how secure or easy is the new feature? Here are four reasons why you could ignore the new security feature:

1) Mail trail or trouble?

The new two step verification feature provides an option to assign an email address for recovery purposes. But it is not mandatory. So if a user forgets to assign an email address, he or she will have no way to recover the forgotten password without entering an email address for the next seven days from the last time the app has been used.


2) Mail verification and exposed to promotions
WhatsApp, in case you provide an email address to activate the two-step verification, doesn’t verify the email address and hence opens the window for pranksters. The company may not be able to figure out if a user is providing a genuine email address however that might backfire on the user.

Even though the mail id is not verified, there are chances of being exposed to unwanted clutter of promotional messages and security threats.

3) Risk of deletion of chats post re-verification

The two step verification process brings with itself a risk of chats deletion. Once a user reverifies his or her account after 7 days without a passcode, then that user will lose all pending messages upon reverifying - they will be deleted.
Also, if a user reverifies his number on WhatsApp after 30 days of last using WhatsApp, and without a passcode, that particular account will be deleted and a new one will be created upon successfully reverifying.

4) Annoying passcode remembering exercises

Just like annoying pop-ups, WhatsApp’s two-step verification once enabled, may periodically ask users to enter the passcode in trying to help users to remember it. Unfortunately, there is no method to disable this nagging prompt without turning off two-step verification altogether. So much for safety.

Friday, September 7, 2018

What is encryption?

Encryption:


In computing, encryption is the method by which plaintext or any other type of data is converted from a readable form to an encoded version that can only be decoded by another entity if they have access to a decryption key. Encryption is one of the most important methods for providing data security, especially for end-to-end protection of data transmitted across networks.

Encryption is widely used on the internet to protect user information being sent between a browser and a server, including passwords, payment information and other personal information that should be considered private. Organizations and individuals also commonly use encryption to protect sensitive data stored on computers, servers and mobile devices like phones or tablets.

Benefits of encryption:


The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the internet or any other computer network. A number of organizations and standards bodies either recommend or require sensitive data to be encrypted in order to prevent unauthorized third parties or threat actors from accessing the data. For example, the Payment Card Industry Data Security Standard requires merchants to encrypt customers' payment card data when it is both stored at rest and transmitted across public networks.

Modern encryption algorithms also play a vital role in the security assurance of IT systems and communications as they can provide not only confidentiality, but also the following key elements of security:

  • Authentication: the origin of a message can be verified.
  • Integrity: proof that the contents of a message have not been changed since it was sent.
  • Nonrepudiation: the sender of a message cannot deny sending the message.

Thursday, September 6, 2018

How Hackers Hack Your Accounts And Passwords And Ways To Avoid Being Compromised

I am sure most of you have been victims of your email accounts being hacked, or your Facebook passwords not working. Well, this may be a result of your password might have been hacked.

One way to keep yourself secure is by knowing how hackers hack the passwords and the methods and software they generally use.

By knowing how hackers get into your account, you will be in a better situation to understand the ways in which you can lose your account information and passwords and thus can protect yourself from getting hacked next time.

How Do Hackers Get Your Passwords?


One of them is phishing pages. A hacker will send a login page of Gmail or Facebook which looks exactly the same as the real Facebook or Gmail login page.

Most of the times they use social engineering skills where they send a message that says “This person has posted your bad picture on Facebook, click here to check your photo”. Once you click on the link, you will be taken to the login page and as soon as you enter your password, it will be available to the hacker.

Most of the time, the victim doesn’t even realize that the password is gone.

There are many other methods being used by hackers to hack passwords or email access.

1. Keyloggers


This is one of the basic tool used for getting your passwords. Keylogger resides in your system memory and runs at every startup. These keyloggers log all your keystrokes.

A log is created and is then sent to the hacker. One of the most famous is the Ardamax Keylogger. It can be customized to not be shown in “Processes” (Windows Task Manager).

I suggest you to start using Online virtual Keyboard when typing passwords for sensitive sites like your bank account, email and Paypal account. You can also start using a password manager that autofills the login data and thus no key logs are made.

2. RAT


RAT stands for Remote Administration Tool. With RAT, a hacker can connect to your PC without your knowledge. The hacker can see your screen and also see the sites you surf. It also has the built-in functionality of keylogger.

Hackers can copy files from your hard disk to his/her computer – all this without your knowledge. A good example of RAT is Poison Ivy. It can be customized to connect to your PC on a particular port number specified while creating the RAT.

3. Trojan Horses

These are the most common types of malware. Trojans spread through warez sites mostly. All of you want free software.

Right?

Beware though!

When you download from warez sites, all the keygens and patches and even the original trial programs are infected with trojan.

This means you will get the software for free, but your computer will be affected with a trojan horse.

When you run the patch/keygen, you’ll get the desired output, but in the background, your system gets infected with the trojan.

Turkojan is a famous Trojan horse. A trojan is much more superior compared to keyloggers or RATs. It provides much more functionality so that the hacker has greater access to your PC.

These days Android phones are most vulnerable to the trojan horse a.k.a backdoors. Hackers will persuade you to install an apk file which will then install a backdoor apk. This is why you should never install .apk files from untrusted sources. We will talk more about how to safeguard yourself in future articles.

There are many other ways which a hacker uses, for example, if you are connected to the internet on a LAN, which uses the same router, a hacker can use any packet sniffer and base decoder to read all sensitive data being transmitted from your computer. Cain and Abel is one such sniffer, but there are many more.

That’s one reason why I always encourage secure browsing whenever possible. Most sites, like Facebook, give an option to use the https login, which encrypts your data. In such cases, even if the hacker uses the sniffer to capture your data, decoding passwords will not be easy.

Brute forcing is another common method, but with technology advancement, most email and web login forms come with features that can handle such attacks.

Well, to be safe, you have to take preventive methods and make sure you enable all security features offered by the web app you are using. I hope this article helps you to understand how hackers hack so thatt you can take all preventive measures to keep your passwords safe.
If you find this article useful, don’t forget to share it on Google plus and Facebook for more social awareness.

Linux is more sercure than Windows

Why Linux Is More Secure Than Windows?

Five key factors underlie Linux's superior security:

1. Privileges

Linux systems are by no means infallible, but one of their key advantages lies in the way account privileges are assigned. In Windows, users are generally given administrator access by default, which means they pretty much have access to everything on the system, even its most crucial parts. So, then, do viruses. It's like giving terrorists high-level government positions.With Linux, on the other hand, users do not usually have such "root" privileges; rather, they're typically given lower-level accounts. What that means is that even if a Linux system is compromised, the virus won't have the root access it would need to do damage systemwide; more likely, just the user's local files and programs would be affected. That can make the difference between a minor annoyance and a major catastrophe in any business setting.

2. Social Engineering

Viruses and worms often spread by convincing computer users to do something they shouldn't, like open attachments that carry viruses and worms. This is called social engineering, and it's all too easy on Windows systems. Just send out an e-mail with a malicious attachment and a subject line like, "Check out these adorable puppies!"--or the porn equivalent--and some proportion of users is bound to click without thinking. The result? An open door for the attached malware, with potentially disastrous consequences organizationwide.Thanks to the fact that most Linux users don't have root access, however, it's much harder to accomplish any real damage on a Linux system by getting them to do something foolish. Before any real damage could occur, a Linux user would have to read the e-mail, save the attachment, give it executable permissions and then run the executable. Not very likely, in other words.

3. The Monoculture Effect

However you want to argue the exact numbers, there's no doubt that Microsoft Windows still dominates most of the computing world. In the realm of e-mail, so too do Outlook and Outlook Express. And therein lies a problem: It's essentially a monoculture, which is no better in technology than it is in the natural world. Just as genetic diversity is a good thing in the natural world because it minimizes the deleterious effects of a deadly virus, so a diversity of computing environments helps protect users.Fortunately, a diversity of environments is yet another benefit that Linux offers. There's Ubuntu, there's Debian, there's Gentoo, and there are many other distributions. There are also many shells, many packaging systems, and many mail clients; Linux even runs on many architectures beyond just Intel. So, whereas a virus can be targeted squarely at Windows users, since they all use pretty much the same technology, reaching more than a small faction of Linux users is much more difficult. Who wouldn't want to give their company that extra layer of assurance?

4. Audience Size

Hand-in-hand with this monoculture effect comes the not particularly surprising fact that the majority of viruses target Windows, and the desktops in your organization are no exception. Millions of people all using the same software make an attractive target for malicious attacks.

5. How Many Eyeballs

"Linus' Law"--named for Linus Torvalds, the creator of Linux--holds that, "given enough eyeballs, all bugs are shallow." What that means is that the larger the group of developers and testers working on a set of code, the more likely any flaws will be caught and fixed quickly. This, in other words, is essentially the polar opposite of the "security through obscurity" argument.With Windows, it's a limited set of paid developers who are trying to find problems in the code. They adhere to their own set timetables, and they don't generally tell anyone about the problems until they've already created a solution, leaving the door open to exploits until that happens. Not a very comforting thought for the businesses that depend on that technology.In the Linux world, on the other hand, countless users can see the code at any time, making it more likely that someone will find a flaw sooner rather than later. Not only that, but users can even fix problems themselves. Microsoft may tout its large team of paid developers, but it's unlikely that team can compare with a global base of Linux user-developers around the globe. Security can only benefit through all those extra "eyeballs."Once again, none of this is to say that Linux is impervious; no operating system is. And there are definitely steps Linux users should take to make their systems as secure as possible, such as enabling a firewall, minimizing the use of root privileges, and keeping the system up to date. For extra peace of mind there are also virus scanners available for Linux, including ClamAV. These are particularly good measures for small businesses, which likely have more at stake than individual users do.It's also worth noting that security firm Secunia recently declared that Apple products have more security vulnerabilities than any others--including Microsoft's.Either way, however, when it comes to security, there's no doubt that Linux users have a lot less to worry about.

Free WiFi Is Not As Safe As You Think! - In Hindi

फ्री Wi-fi इस्तेमाल करें, लेकिन संभलकर स्मार्टफोन हो, टैबलेट या फिर लैपटॉप. Internet की सुविधा के बिना इन तीनों की उपयोगिता बेमानी लग...